Francesco Regazzoni --- The security of cryptographic algorithms is based on hardness assumptions. They aim to ensure that an adversary cannot solve the underlying hard problem even with a vast amount of resources. Until recently, these assumptions mainly concentrated on the intractability of solution with respect to a classical…

BioHack 2018 is a collaboration between the Society of Women Engineers and Biomedical Engineering Society introduces BioHack, the very first student-run 12 hour health/medicine-themed hackathon at the University of California, Riverside. Throughout this 12-hour hackathon, students will form teams to work on projects, attend…

Daniel Wong --- Graphical processing units (GPUs) are the main provider of computational power for many emerging workloads, such as data mining, machine learning, cryptocurrency mining, and high-performance computing. The mainstream adoption of GPUs over the past decade has mainly been driven by the GPU’s ability to provide order-…

Zhenhui (Jessie) Li --- Large-scale mobility data can be collected from mobile phones, car navigation systems, road surveillance cameras, and loop sensors. Turning such raw data into knowledge can provide insights about our city and empower the city to be more intelligent. In this talk, I would like to share new data mining and…